Author:
Usop Nur Alya Afikah,Hisham Syifak Izhar
Publisher
Springer International Publishing
Reference41 articles.
1. Computer Hope. https://www.computerhope.com/jargon/p/pdf.htm. Accessed 2018
2. Yang, H., Kot, A.C.: Text document authentication by integrating intercharacter and word spaces watermarking. In: 2004 IEEE International Conference on Multimedia and Expo (ICME) (2004)
3. Mir, N.: Copyright for web content using invisible text watermarking. Comput. Human Behav. 30, 648–665 (2014)
4. Kamaruddin, N.S., Kamsin, A., Por, L.Y., Rahman, H.: A review of text watermarking: theory, methods, and applications. IEEE Access 6, 8011–8028 (2018)
5. Kim, Y.W., Oh, I.S.: Watermarking text document images using edge direction histograms. Pattern Recognit. Lett. 25, 1243–1251
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Robust Content Authentication and Tampering Detection of Arabic Text Transmitted Through Internet;2023 6th International Conference on Engineering Technology and its Applications (IICETA);2023-07-15